Vulnerability Assessment and Penetration Testing of Odlar Yurdu University Network

Authors

  • Mazahim Guliyev Author
  • Khalil Ismayilov Author
  • Amin Hasanov Author
  • Vusale Hasanova Author

Keywords:

Vulnerability Clustering Methods, Machine Learning, Network Security, Algorithm, Penetration Testing Monitoring

Abstract

Recent research in network management and enhancing network security efficiency has seen widespread use of traffic classification and clustering. The increasing use of the Internet and the development of protocols and applications have also made research in the field of traffic classification highly relevant. Vulnerability assessments and penetration testing determine the security posture of modern information networks. By assessing university network vulnerabilities and attempting to exploit found vulnerabilities through penetration testing, security specialists can evaluate the effectiveness of their network defences by identifying defence 
weaknesses and affirming the defence mechanisms in place. 

Downloads

Published

2025-11-08

Issue

Section

Articles